{"id":9610,"date":"2025-03-07T19:15:45","date_gmt":"2025-03-07T19:15:45","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=9610"},"modified":"2025-04-28T21:35:53","modified_gmt":"2025-04-28T21:35:53","slug":"tech-support-scams","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/","title":{"rendered":"Tech Support Scams: How Cybercriminals Exploit Trust"},"content":{"rendered":"\n<p>With over 37,560 victims in 2023<sup>(1)<\/sup>, tech support scams are one of the most widespread forms of digital fraud. These schemes often target seniors, with US citizens over 60 losing more than $340 million dollars in just the past two years<sup>(<\/sup><sup>2)<\/sup>.&nbsp;<\/p>\n\n\n\n<p>What started as phony phone calls has exploded into an intricate web of multi-channel attacks targeting victims through emails, websites, and pop-ups. These scams utilize both social engineering and technical invasion to attain the necessary data for extortion.&nbsp;<\/p>\n\n\n\n<p>While their methods have developed, it&#8217;s still possible to uncover the true identity of these impersonators. Knowing their procedures and how to derive evidence from the subsequent digital footprint left behind are critical components to a tech scam investigation.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-deep-dive-into-tech-support-scams-nbsp\"><span class=\"ez-toc-section\" id=\"A_Deep_Dive_into_Tech_Support_Scams\"><\/span>A Deep Dive into Tech Support Scams&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Tech support scams look to capitalize on the good name of established brands such as Microsoft, Apple, Norton, Geek Squad, and other giants in the tech realm. Seniors who are less technologically savvy are disproportionately targeted, with those over 60 being more than five times more likely of falling victim<sup>(<\/sup><sup>3)<\/sup>. The following are the most common ways a tech support scammer may attempt to reach you:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fake Pop-Ups: <\/strong>You\u2019ve probably heard of the \u201ccongratulations, you\u2019ve won\u201d pop-up scams from the early days of the internet. Today, many scammers opt to motivate their targets with fear, utilizing pop-ups that tell them their device has a virus and lead them to contact a fraudulent tech support ring.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unsolicited Phone Calls: <\/strong>These scammers sometimes reach out to their targets over the phone with unprompted warnings of potential issues found on their device. The target is then asked to allow the scammer remote access to their device by installing programs that grant full access to the device or contain malware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing Emails: <\/strong>You may receive a carefully crafted email containing personal information that the scammer gained through a <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">data breach<\/a>. The email intends to convince you that it was truly sent from a reputable organization and persuade you to surrender further data. A common example is <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/geek-squad-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cGeek Squad\u201d phishing email scams<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The data left behind in these exchanges, such as email header metadata, malicious scripts, and access logs, combined with knowledge of common strategies used in these scams can help determine the extent of damage, reveal the source, and begin the <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/recover-funds-from-scammers\/\">recovery process<\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-common-techniques-used-by-tech-support-scammers-nbsp\"><span class=\"ez-toc-section\" id=\"Common_Techniques_Used_by_Tech_Support_Scammers\"><\/span>Common Techniques Used by Tech Support Scammers&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>While scams have a variety of approaches, they share the same goals of stealing data, installing <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/malware-prevention\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a>, or extorting payment. Cybercriminals typically employ some variation of the following strategies:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Impersonation &amp; Spoofing: <\/strong>This is typically the first step in these scams. Perpetrators will portray themselves as a trusted entity such as a bank, government agency, or popular corporation such as the \u201cGeek Squad\u201d scam. They may go as far as spoofing the email header, caller ID, or website URL to make their ploy more convincing.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Remote Access Tools: <\/strong>Once the initial trust is established, scammers will convince their target that they need to grant them remote access to their device to properly resolve the fake issue. Once the program is installed, the scammer can weaponize any private data stored on the device.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Credential Theft: <\/strong>This technique can enable the scammer in more ways than one. The theft of employee credentials can allow a perpetrator to inconspicuously assume the role of a trusted entity. They can use this guise to then steal credentials from their victim that can be used to commit extortion.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fake Payment Pages: <\/strong>On top of stealing the victim\u2019s data, these scams will ask for payment for their illusory services. Perpetrators will create spoofing websites that appear nearly identical to the legitimate company\u2019s page to collect payments and financial data.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-red-flags-amp-warning-signs-identifying-a-tech-support-scam-nbsp\"><span class=\"ez-toc-section\" id=\"Red_Flags_Warning_Signs_Identifying_A_Tech_Support_Scam\"><\/span>Red Flags &amp; Warning Signs: Identifying A Tech Support Scam&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Knowledge is the greatest factor in avoiding scams such as these. These cybercriminals gravitate toward <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/senior-romance-scams\/\" target=\"_blank\" rel=\"noreferrer noopener\">scamming seniors <\/a>with less technical understanding. It is important for anybody, but especially those at higher risk, to be aware of the typical characteristics of these schemes.\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unsolicited Contact: <\/strong>The abundance of these scams prompted a warning from the FBI<sup>(<\/sup><sup>4)<\/sup> that any legitimate customer or tech support would not reach out to their customers without them first making a request.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pop-ups: <\/strong>Any alerts that lock your screen or demand immediate action should set off alarms in your head. Don\u2019t click any links or call a number listed in one of these pop-ups.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pressure Tactics: <\/strong>Scammers create a sense of urgency that leads their targets to act irrationally. Being met with a time-sensitive message that your device has been infected can cause people to click without properly considering its credibility.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Request for Remote Access: <\/strong>If you\u2019ve engaged in conversation with a supposed tech support representative and they are eager to take over control of your device, you should probably cut them off.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Demand for Specific Payment Forms: <\/strong>In the aforementioned warning against unsolicited calls, the FBI also advised legit support resources won\u2019t request forms of payment that are difficult to trace like gift cards, wire transfer, cryptocurrency, or cash<sup>(<\/sup><sup>4)<\/sup>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-digital-forensics-detects-scams-post-incident-nbsp\"><span class=\"ez-toc-section\" id=\"How_Digital_Forensics_Detects_Scams_Post-Incident\"><\/span>How Digital Forensics Detects Scams Post-Incident&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>After an incident, digital forensic experts can <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/malware-prevention\/\" target=\"_blank\" rel=\"noreferrer noopener\">trace malware infections<\/a> to their source, identify the origin of pop-up messages, and examine suspicious browser activity to determine:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Which sites delivered the scam? <\/strong>Knowing which sites were compromised can help experts detect culpable vulnerabilities and protect potential future victims.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Were remote access tools installed? <\/strong>Check your downloaded files and task manager if you gave remote access to the scammer. LogMeIn, TeamViewer, and RemotePC are some common software names to look out for.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Was malware or additional spyware left behind? <\/strong>In addition to remote software, these scams leave you vulnerable to ransomware, spyware, and other malicious programs. Inspect your downloads and run a virus scan.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-aftermath-of-a-tech-support-scam-why-digital-forensics-is-essential-nbsp\"><span class=\"ez-toc-section\" id=\"Aftermath_of_a_Tech_Support_Scam_Why_Digital_Forensics_Is_Essential\"><\/span>Aftermath of a Tech Support Scam: Why Digital Forensics Is Essential&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Tech support scams carry the threat of exponential damage to the victim that can expand outside of the initial incident and only worsens as time passes. However, there are ways to seek support. Knowing where to turn and taking immediate action is monumental in mitigating misfortune and preserving proof on your road to recovery.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-risks-after-a-tech-support-scam-nbsp\"><span class=\"ez-toc-section\" id=\"Risks_After_a_Tech_Support_Scam\"><\/span>Risks After a Tech Support Scam&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Even after the initial scam, the threat of further anguish is as existent as ever. Quickly utilizing the support resources available is essential to making an on-going recover and avoiding continued suffering in the form of:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Credential Theft: <\/strong>Your private information that was compromised in the scam can be sold to other cybercriminals or used for <a href=\"https:\/\/www.digitalforensics.com\/cyber-security\/online-identity-theft\">online identity theft<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Persistent Backdoors: <\/strong>Any passwords acquired or malware installed on your device can serve as a potential in for scammers even after the initial attack.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Financial Fraud: <\/strong>The financial data you provided for payment can be used for fraudulent expenditures. Additionally, the credential theft listed above can be used to open fraudulent credit accounts in your name.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-collecting-evidence-nbsp\"><span class=\"ez-toc-section\" id=\"Collecting_Evidence\"><\/span>Collecting Evidence&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Digital forensics experts can help you collect the evidence necessary to take legal action through methods such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Full Device Imaging: <\/strong>By successfully duplicating the files on a storage device, analysts can preserve the evidence of a cybercrime and potentially recover deleted files.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Timeline Reconstruction: <\/strong>Using evidence like internet logs, metadata, and IP tracking, experts can accurately determine the chronology of the crime.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware &amp; Remote Access Analysis: <\/strong>Understanding the origin, purpose, and capabilities of a software allows experts to unmask the perpetrator, determine the total damage, and adopt the appropriate recovery method.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Source Tracing: <\/strong>Analysts can investigate email header data, phone numbers, and hypertext within communications to determine the root of the attack.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reporting &amp; Documentation: <\/strong>With the evidence collected through their investigation, experts can help connect you with the correct law enforcement agency where you can report the crime.&nbsp;<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.digitalforensics.com\/contact-us\" target=\"_blank\" rel=\" noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"256\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA-1024x256.png\" alt=\"\" class=\"wp-image-8636\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA-1024x256.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA-300x75.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA-768x192.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA-512x128.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA-920x230.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/DFC-Blackmail-Scams-General-CTA.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-digital-forensics-corp-investigates-tech-support-scams-nbsp\"><span class=\"ez-toc-section\" id=\"How_Digital_Forensics_Corp_Investigates_Tech_Support_Scams\"><\/span>How Digital Forensics Corp Investigates Tech Support Scams&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Digital forensic investigation doesn\u2019t just answer what happened, it also answers key factors like who\u2019s behind the attack, how they gained access, what data was compromised, and what vulnerabilities lead to the attack. This information is not only crucial to determining the full scope of the attack but also preventing similar instances from occurring in the future.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-key-forensic-techniques-used-in-tech-support-scam-investigations-nbsp\"><span class=\"ez-toc-section\" id=\"Key_Forensic_Techniques_Used_in_Tech_Support_Scam_Investigations\"><\/span>Key Forensic Techniques Used in Tech Support Scam Investigations&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you know where to look, evidence of the crime is scattered throughout miscellaneous data trails left behind by the scammer. Digital Forensics experts have this knowledge and can support victims of tech support scams through the following strategies:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Email Header &amp; Domain Analysis: <\/strong>Schemes like the previously mentioned <a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/geek-squad-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cGeek Squad\u201d scam <\/a>often spoof their email headers or URL to appear as if they came from the legitimate company. However, analysis of the metadata within these files can clue experts in on the true culprit.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Remote Session Review: <\/strong>Reviewing logs of remote access on the compromised device can give analysts insight to who accessed the device, when they accessed it, and the device used to access it.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network Traffic Analysis: <\/strong>Experts can spot irregularities in network traffic that could indicate that suspicious activity or security jeopardization has occurred.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware Reverse Engineering: <\/strong>Much like a virologist, digital forensics experts can dissect and interpret malicious programs in a controlled environment to determine their purpose and the extent of its hazard.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>System Log Review: <\/strong>By looking over system logs, analysts can see all activity that has taken place on the device. This includes error reports, file requests and transfers, and sign-in attempts.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-scammed-get-help-now-nbsp\"><span class=\"ez-toc-section\" id=\"Scammed_Get_Help_Now\"><\/span>Scammed? Get Help Now&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Here at DFC, we have handled thousands of cases spanning the vast array of online fraud, including tech support scams. Our goal is to remove the digital anonymity of these scammers and connecting you with resources who can provide further support.&nbsp;<\/p>\n\n\n\n<p>Our device fingerprinting techniques, including IP tracking and metadata analysis let us bring these cybercriminals to light. Furthermore, our cooperation with legal agencies around the globe allows us to connect you with the correct law enforcement to pursue justice.&nbsp;And in cases where scammers demand cryptocurrency, our team can also <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/crypto-wallet-tracing\/\">investigate stolen crypto<\/a> as part of the broader forensic process.<\/p>\n\n\n\n<p>If you have fallen victim to one of these scams, we are here to help. Call today for a <a href=\"https:\/\/www.digitalforensics.com\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">free consultation<\/a> with one of our specialists.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sources-nbsp\"><span class=\"ez-toc-section\" id=\"Sources\"><\/span>Sources:&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.ic3.gov\/AnnualReport\/Reports\/2023_IC3Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2023_IC3Report.pdf<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2024\/11\/ftc-takes-aim-top-fraud-driving-losses-among-older-americans#:~:text=So%20far%20in%202024%2C%20consumers%20have%20reported%20losing,more%20than%20%24165%20million%20to%20tech%20support%20scams.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FTC Takes Aim at Top Fraud Driving Losses Among Older Americans | Federal Trade Commission<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/federal-trade-commission-protecting-older-adults-report_102024.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Protecting Older Consumers 2023-2024 (A Report of the Federal Trade Commission)<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\/boston\/news\/press-releases\/fbi-warns-public-to-beware-of-tech-support-scammers-targeting-financial-accounts-using-remote-desktop-software\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software \u2014 FBI<\/a>&nbsp;<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"With over 37,560 victims in 2023(1), tech support scams are one of the most widespread forms of digital&hellip;","protected":false},"author":131,"featured_media":9611,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-9610","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding The Workings of Tech Support Scams.<\/title>\n<meta name=\"description\" content=\"Learn how to protect yourself from tech support scams. Understand the risks and how Digital Forensics Corp can help you stay safe online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tech Support Scams: How Cybercriminals Exploit Trust\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect yourself from tech support scams. Understand the risks and how Digital Forensics Corp can help you stay safe online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-07T19:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T21:35:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/DFC-Tech-Support-Scams.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jack Gillespie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jack Gillespie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/\"},\"author\":{\"name\":\"Jack Gillespie\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\"},\"headline\":\"Tech Support Scams: How Cybercriminals Exploit Trust\",\"datePublished\":\"2025-03-07T19:15:45+00:00\",\"dateModified\":\"2025-04-28T21:35:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/\"},\"wordCount\":1808,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/DFC-Tech-Support-Scams.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/\",\"name\":\"Understanding The Workings of Tech Support Scams.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/DFC-Tech-Support-Scams.png\",\"datePublished\":\"2025-03-07T19:15:45+00:00\",\"dateModified\":\"2025-04-28T21:35:53+00:00\",\"description\":\"Learn how to protect yourself from tech support scams. Understand the risks and how Digital Forensics Corp can help you stay safe online.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/DFC-Tech-Support-Scams.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/DFC-Tech-Support-Scams.png\",\"width\":1080,\"height\":1080,\"caption\":\"Stay vigilant! Tech support scams are on the rise. Learn how to protect yourself and your data. Contact Digital Forensics Corp for expert assistance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/tech-support-scams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tech Support Scams: How Cybercriminals Exploit Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/4eb49f01ff515fad38e835a9b9497fba\",\"name\":\"Jack Gillespie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/jack-gillespie_avatar-96x96.png\",\"caption\":\"Jack Gillespie\"},\"description\":\"Cybercrime Writer & Awareness Advocate \\\"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\\\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \\\"Sextortion Awareness for Children\\\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jack-gillespie-21aa85222\\\/\"],\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/jack-gillespie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding The Workings of Tech Support Scams.","description":"Learn how to protect yourself from tech support scams. Understand the risks and how Digital Forensics Corp can help you stay safe online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/","og_locale":"en_US","og_type":"article","og_title":"Tech Support Scams: How Cybercriminals Exploit Trust","og_description":"Learn how to protect yourself from tech support scams. Understand the risks and how Digital Forensics Corp can help you stay safe online.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-03-07T19:15:45+00:00","article_modified_time":"2025-04-28T21:35:53+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/DFC-Tech-Support-Scams.png","type":"image\/png"}],"author":"Jack Gillespie","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Jack Gillespie","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/"},"author":{"name":"Jack Gillespie","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba"},"headline":"Tech Support Scams: How Cybercriminals Exploit Trust","datePublished":"2025-03-07T19:15:45+00:00","dateModified":"2025-04-28T21:35:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/"},"wordCount":1808,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/DFC-Tech-Support-Scams.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/","name":"Understanding The Workings of Tech Support Scams.","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/DFC-Tech-Support-Scams.png","datePublished":"2025-03-07T19:15:45+00:00","dateModified":"2025-04-28T21:35:53+00:00","description":"Learn how to protect yourself from tech support scams. Understand the risks and how Digital Forensics Corp can help you stay safe online.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/DFC-Tech-Support-Scams.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/03\/DFC-Tech-Support-Scams.png","width":1080,"height":1080,"caption":"Stay vigilant! Tech support scams are on the rise. Learn how to protect yourself and your data. Contact Digital Forensics Corp for expert assistance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Tech Support Scams: How Cybercriminals Exploit Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/4eb49f01ff515fad38e835a9b9497fba","name":"Jack Gillespie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/jack-gillespie_avatar-96x96.png","caption":"Jack Gillespie"},"description":"Cybercrime Writer & Awareness Advocate \"You don\u2019t need to be a tech expert to protect yourself online \u2014 but you do need the right information.\" \u2014 Jack Gillespie \u00a0 Jack Gillespie is a cybersecurity content writer who specializes in explaining the human, emotional, and technical elements behind modern online threats. With a background in journalism and a passion for digital safety, Jack creates high-impact, approachable content that helps readers of all experience levels understand, recognize, and respond to cybercrime. \u00a0 Areas of Expertise Jack\u2019s work aims for the sweet spot at the intersection of technology and psychology, helping readers stay informed and protected through education that\u2019s delivered in a digestible manner: \u2022 Social engineering scams \u2013 how manipulation tactics fuel phishing, sextortion, and online fraud. \u2022 Data breach scenarios \u2013 why they happen, how they spread, and how readers can proactively minimize exposure. \u2022 Malware and ransomware \u2013 plain-language breakdowns of how malicious software works and what to do if affected. \u00a0 Role at Digital Forensics Corp. At Digital Forensics Corp., Jack blends editorial clarity with technical accuracy to produce content that educates, supports, and engages. He contributes to both writing and editing efforts, working closely with cybersecurity experts and legal professionals to ensure each piece meets high standards of credibility and readability. His priority is helping people recognize threats before they arise \u2014 and empowering those already affected to take the next steps with confidence through expert advice. \u00a0 Key Publications & Projects \u2022 \"Sextortion Awareness for Children\" Booklet \u2013 A youth-focused educational guide distributed through local schools to help minors identify, avoid, and report this rapidly expanding cybercrime. \u2022 Sextortion Explained \u2013 A detailed resource for sextortion victims that explains common tactics, recovery strategies, legal protections, and examples of real-life cases. \u2022 \u201cOperation Artemis\u201d Coverage \u2013 \u201cFive Ws\u201d breaking news style coverage of a major FBI investigation that led to the extradition of 22 Nigerian nationals involved in an international sextortion ring. \u00a0 Professional Perspective Jack is committed to making cybersecurity education accessible to all, regardless of background or technical skill. Whether writing for victims, parents, small business owners, or curious readers, he combines journalistic integrity with a human-centered approach to ensure each message resonates with a broad audience. \u00a0 Education & Credentials \u2022 B.A. in Journalism and Promotional Communications Cleveland State University \u2022 SEO Principles Certification Semrush Academy \u00a0 Additional Background Jack began his career as a freelance sports journalist, where he sharpened his storytelling skills and editorial discipline: \u2022 Contributor at Ohio Varsity \u2022 Reporter for Geauga County Maple Leaf\u00a0 This experience has strengthened his ability to adapt his voice across formats and audiences \u2014 from breaking news to educational deep-dives.","sameAs":["https:\/\/www.linkedin.com\/in\/jack-gillespie-21aa85222\/"],"url":"https:\/\/www.digitalforensics.com\/blog\/author\/jack-gillespie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/9610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=9610"}],"version-history":[{"count":8,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/9610\/revisions"}],"predecessor-version":[{"id":14558,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/9610\/revisions\/14558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/9611"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=9610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=9610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=9610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}